Spelling suggestions: "subject:"forminformation technology.but africa."" "subject:"forminformation technology.but affrica.""
101 |
Belief and actual behaviour in green information technology within a South African tertiary institutionChiyangwa, Tawanda Blessing 02 1900 (has links)
Most research in green IT tend to focus on the practices of large IT vendors and companies. There is therefore a need to examine the beliefs and actual behaviour of IT users about green IT, as it significantly impact of energy consumption and computer design on the broader society. The main question to be answered was ―Are IT users generally concerned with regards to green IT issues?‖. Therefore the main purpose of this study was thus to evaluate the beliefs and actual behaviour of IT users regarding green IT in South Africa through a survey that was completed by university students and lecturers. The paucity of available research on this subject pertaining to South Africa justifies the importance of conducting this study. A hypothesised research model based on the theory of planned behaviour (TPB) was used to evaluate the main factors contributing to green IT awareness in an empirical study. A mixed research method was used as the paradigm which combines aspects from both interpretive and positivist research approaches. A questionnaire was used to collect data from university students and lecturers. The data was captured and analysed for convergent validity. The reliability of measurement items was tested using Cronbach‘s alpha. Structural Equation Modelling was used to model latent variables under conditions of non-normality. Subjective norm was the main factor contributing to intended belief and actual behaviour / School of Computing / M.A. (Computer Science)
|
102 |
The role of emotional intelligence in implementing information technology strategiesvan Blerk, Willem Eben January 2013 (has links)
Thesis submitted in fulfilment of the requirements for the degree
Doctor of Technology: Information Technology
in the Faculty of Informatics and Design
at the Cape Peninsula University of Technology
2013 / The alignment between business and information technology (IT) strategies has been a challenge for many years. Strategic alignment models and enterprise architecture methodologies and frameworks have been developed to assist business and IT managers with improving alignment between business and IT strategies.
The business analyst, systems analyst and project manager are key role players in delivering the information systems (IS) needs of business and therefore key in aligning business and IT strategies. Despite literature and research suggesting a positive influence of emotional intelligence on occupational performance in various industries, the development of emotional intelligence of the business analyst, systems analyst and project manager is neglected by software development organisations. Emotional intelligence is neglected in industry IS competency models as well as documented standards for the business analysis and project management profession (BABOK and PMBOK). Emotional intelligence is not addressed in strategic alignment models and enterprise architecture methodologies and frameworks. Emotional intelligence is equally neglected in IS literature. Systematic research investigating the impact of emotional intelligence on occupational performance of IT professionals remains sparse.
The purpose of this study was to determine which emotional intelligence competencies are needed to improve the occupational performance of business analysts, systems analysts and project managers in delivering business information system needs. The study took the form of a multiple interpretive case study. Qualitative data was collected using semi-structured interviews with stakeholders from 20 software development organisations utilising the roles of the business analyst, systems analyst and project manager. Quantitative data was collected using the Genos Emotional Intelligence Inventory with the aim of identifying the patterns of emotional intelligence visible in the sample of business analysts, systems analysts and project managers assessed.
The study suggests emotional intelligence has a role to play in alignment between business and IT strategies. It is proposed that industry IS competency models as well as the standards for the business analysis and project management profession as documented in BABOK and PMBOK include specific emotional intelligence competencies. The study also proposes that higher education institutions in IT/IS such as universities of technology, as well as training providers focusing on business analysis, systems analysis and project management, should focus not only on technical skills but emotional intelligence skills as well when developing the supply pipeline of business analysts, systems analysts and project managers.
Keywords:
Emotional intelligence, business – IT alignment, information technology, enterprise architecture, business analyst, systems analyst, project manager, competencies, non-technical skills.
|
103 |
A needs-ICTD strategy alignment framework foundation for the measurement of ICTD impactBaduza, Gugulethu Qhawekazi January 2014 (has links)
Many Information and Communication Technologies for Development (ICTD) projects are established with the overall aim of positively developing the communities they are implemented in. However, the solutions that are provided are often commonly developed without the needs of these communities being sufficiently investigated beforehand. As a result the ICTD strategy of the project ends up not well aligned with the aims and targets of the needs of the community. As a result of this, an appropriate programme theory for the project and relevant impact indicators fail to be adequately developed. Consequently, when an impact assessment is conducted it is often found that the intended effects are not directly linked to the needs of the community or what the community had hoped to gain from the ICTD initiative. The purpose of this research serves to develop a needs-ICTD strategy alignment foundation that supports the identification and formulation of impact assessment indicators. Through this research, a framework is developed to support the alignment of ICTD strategy, the development and the promotion of contextual needs of rural communities and other frequently marginalized areas. The Needs-ICTD strategy alignment framework is composed of eight main components that describe the process that can be used to align ICTD strategy with community needs. These components include: collaboration between the internal and external stakeholders, the development of the community, conducting baseline studies, the needs assessment, the ICTD strategy, linking of the needs-ICTD strategy, and lastly the identification of impact indicators. An interpretive research approach is used to explore and inform the framework through a multi-case study investigation of the Siyakhula Living Lab and two projects in the Systems Application Products (SAP) Living Lab. Two main case study questions drive the exploration of the framework, that being: 1) How are the needs of the community elicited and how is the ICTD strategy aligned to the needs of the community? 2) And, why were the selected approaches chosen for aligning the needs of the community and ICTD strategy? Data for this research was collected qualitatively through interviews, document analysis and participant observation. Key findings indicate that the involvement of internal (local) stakeholders in the development and alignment of ICTD strategy to the needs of the community is still lacking. As a consequence, many community members end up not fully understanding the project objectives and how these objectives aims are to be achieved. The research also finds that ‘solution specific’ projects also fail communities as they focus specifically on one target group and repeatedly fail to assist the community holistically in supporting their information and their community development needs.
|
104 |
The potential and reality of the Living Lab model of ICT for Development (ICT4D) in the rural development context : the case of Siyakhula Living Lab, Dwesa, Eastern Cape, South AfricaMosuoe, Teboho Priscilla January 2014 (has links)
This thesis explores the contribution of Information and Communication Technology (ICT) in rural development processes. Within the framework of social capital theory, and in the context of the information society, the study examines how the collaborative and innovative model of ICT for Development (ICT4D) can enhance social networks and information channels in rural communities, thereby enabling the active participation of rural community members in their own development processes. The study examines networks and information channels both within the rural communities under investigation and between these communities and other sectors in the society. The thesis studies the case of the Siyakhula Living Lab (SLL), an ICT4D initiative in the Mbashe Municipality of the Eastern Cape Province of South Africa. During the investigation, four types of networks were identified: local organisations, social institutions, collective community projects and social ties. It was found that the Living Lab has so far influenced the creation of new forms of networks through the common spaces (computer labs) which have been made available by the Living Lab. The study further showed that the use of computers has enabled other community members to partake in the wider community of online/virtual social networks, allowing them to communicate and share information with those outside their own communities. The study also showed that the Living Lab has enabled the networking of these communities with other sectors such as academia. It was, however, found that so far the existence of the Living Lab has not influenced the already existing local networks in these communities. Also, the study showed that the relationship between these rural communities and their government and industry partners as stakeholders in the Living Lab is currently ineffective. Nevertheless, this situation has a potential to change in the future as there are ICT applications which have been developed through collaboration with rural community members, which will assist in enhancing communication between these rural communities and other stakeholders. The study finally revealed that social networks do contribute to the functioning of communities by providing both monetary and social support to community members, even though, in effect, the monetary benefits are somewhat limited by a number of factors. It is revealed that the engagement of ICT could go a long way in improving social and economic activities, governance and service delivery, as well as education in these communities.
|
105 |
Development of isiXhosa text-to-speech modules to support e-Services in marginalized rural areasMhlana, Siphe January 2011 (has links)
Information and Communication Technology (ICT) projects are being initiated and deployed in marginalized areas to help improve the standard of living for community members. This has lead to a new field, which is responsible for information processing and knowledge development in rural areas, called Information and Communication Technology for Development (ICT4D). An ICT4D projects has been implemented in a marginalized area called Dwesa; this is a rural area situated in the wild coast of the former homelandof Transkei, in the Eastern Cape Province of South Africa. In this rural community there are e-Service projects which have been developed and deployed to support the already existent ICT infrastructure. Some of these projects include the e-Commerce platform, e-Judiciary service, e-Health and e-Government portal. Although these projects are deployed in this area, community members face a language and literacy barrier because these services are typically accessed through English textual interfaces. This becomes a challenge because their language of communication is isiXhosa and some of the community members are illiterate. Most of the rural areas consist of illiterate people who cannot read and write isiXhosa but can only speak the language. This problem of illiteracy in rural areas affects both the youth and the elderly. This research seeks to design, develop and implement software modules that can be used to convert isiXhosa text into natural sounding isiXhosa speech. Such an application is called a Text-to-Speech (TTS) system. The main objective of this research is to improve ICT4D eServices’ usability through the development of an isiXhosa Text-to-Speech system. This research is undertaken within the context of Siyakhula Living Lab (SLL), an ICT4D intervention towards improving the lives of rural communities of South Africa in an attempt to bridge the digital divide. Thedeveloped TTS modules were subsequently tested to determine their applicability to improve eServices usability. The results show acceptable levels of usability as having produced audio utterances for the isiXhosa Text-To-Speech system for marginalized areas.
|
106 |
Assessing information security compliant behaviour using the self-determination theoryGangire, Yotamu 02 1900 (has links)
Information security research shows that employees are a source of some of the security incidents in the organisation. This often results from failure to comply with the Information Security Policies (ISPs). The question is, therefore, how to improve information security behaviour of employees so that it complies with the ISPs. This study aims to contribute to the understanding of information security behaviour, especially how it can be improved, from an intrinsic motivation perspective.
A review of the literature suggested that research in information security behaviour is still predominantly based on the extrinsic perspective, while the intrinsic perspective has not received as much attention. This resulted in the study being carried out from the perspective of the self-determination theory (SDT) since this theory has also not received as much attention in the study of information security behaviour. The study then proposed an information security compliant behaviour conceptual model based on the self-determination theory, (ISCBMSDT).
Based on this model, a questionnaire, the ISCBMSDT questionnaire, was developed using the Human Aspects of Information Security Questionnaire and SDT. Using this questionnaire, a survey (n = 263) was carried out at a South African university and responses were received from the academic, administrative and operational staff. The following statistical analysis of the data was carried out: exploratory factor analysis, reliability analysis, analysis of variance (ANOVA), independent samples test (t-tests) and Pearson correlation analysis. The responses to the survey questions suggest that autonomy questions received positive perception followed by competence questions and relatedness questions. The correlation analysis results show the existence of a statistically significant relationship between competence and autonomy factors. Also, a partial significant relationship between autonomy and relatedness factors as well as between competence and relatedness factors was observed.
The exploratory factor analysis that was performed on the questionnaire produced 11 factors.
Cronbach alpha was then computed for the eleven factors and all were found to be above 0.7, thus suggesting that the questionnaire is valid and reliable. The results of the research study also suggest that competence and autonomy could be more important than relatedness in directing information security behaviour among employees. / School of Computing / M. Tech. (Information Technology)
|
107 |
The career advancement experiences of female managers in the ICT sectorZikode, Zolile Londiwe Nosibusiso 03 1900 (has links)
A considerable amount of research effort has been invested in investigating the under-representation of women and their career advancement in traditionally male dominated sectors. Although it is widely recognised that females’ participation at all levels of management as well as in the economy has increased substantially over the years, more than half of the economically active women in South Africa are still found in occupations which are extensions of the traditional female role. The technology sector is regarded as one of the vital sectors to the economic development and sustainability of any country, therefore, attracting and retaining women in the sector is an imperative. Despite initiatives to address inequalities in the workplace, attracting and retaining women in the ICT sector nevertheless remains a challenge. Thus, the aim of this research was to explore the career advancement experiences of female managers in the ICT sector.
An exploratory qualitative study approach was adopted to gain insights into the said career advancement experiences of female managers at different levels in an ICT company. Semi-structured interviews were administered to ten female managers in the company. Insights from the interviews formed the basis of the data analysed using Interpretative Phenomenological Analysis (IPA).
Integrating the participants’ experiences with pertinent literature provided an in-depth understanding of female managers’ career advancement experiences. Literature and findings of the research indicate that various factors combine to give effect to the so-called glass ceiling, which denies women access to opportunities crucial for their career advancement. Lack of role models, mentoring and networking opportunities, work/family conflict, working hours, training and development and organisational culture were identified as factors that inhibit the advancement of women into senior leadership positions. In addition, the findings further revealed that commitment to ongoing development, mentorship, an enabling organisational culture and flexible work environment are career advancement enablers.
The outcome of the study confirms that there is an imbalance in the representation of women at senior management levels in the participating organisation (at the time the study was done) and, while numerous studies have sought to analyse the trends in employment and retention, in South Africa very little is known about the factors that influence the retention and advancement of women, specifically in the ICT sector. The study thus highlights the interventions required to attract, develop and retain women in the ICT sector as a means for organisations gaining a competitive advantage. / Industrial and Organisational Psychology / M. Com. (Industrial and Organisational Psychology)
|
108 |
A model for effective use of human resource information systems in South African State Owned AgenciesMabaso, Thembi Merlyn 12 1900 (has links)
The relevance of this thesis is in addressing information systems business leadership HRIS use issues.The thesis explains acceptance and use issues central to Human Resource Information Systems (HRIS) within South African State Owned Agencies (SOAs). Organisations typically deploy HRIS with a view to automate Human Resource (HR) service delivery and administrative functions. Among other values, HRIS produces useful data and information which optimises HR operations and improves decision-making. However, the use of HRIS, notably within SOAs, is poorly understood owing to inadequate literature and contextualised studies. Despite the tremendous amount of investment into such systems, SOAs continuously identify emerging challenges and issues pertinent to HR operations and administration. For instance, despite HRIS automation, job applications and recruitment are still manually processed, which means that the costly implemented HRIS is not effectively used, and is thus underutilised.
The burning questions for business leadership remain - why is HRIS not optimally utilised given significant organisational investment on such systems, and the mixed return-on-investments? The other question relates to what the level of acceptance is and actual use of these HR systems. There is also a need to determine to what extent do these systems enable or improve the delivery of human resource services and administration. Moreover, what influences the use of HRIS? Previous literature and organisational practice inadequately addresses these questions. This thesis, therefore, addresses these key issues to bridge these preceding knowledge gaps.
In order to explain the use and subsequent effective use of HRIS, the study triangulated three theories as theoretical lenses. These theories are the Unified Theory of Acceptance and Use of Technology (UTAUT), Self Determination Theory (SDT), and the Representation Theory (RT). These theories are employed to explore and explain the individual use, and subsequent effective use of HRIS. In this respect, the ontological stance for this thesis is that reality is objective. Thus, the study followed a positivist research paradigm, whilst the research the approach was deductive. A survey research strategy was employed during the study to obtain primary data. Survey participants included executives and individuals from speciality units e.g. HR, Finance, Supply Chain, Support departments (including IT and Help Desks) as well as other HRIS users. Participants were drawn from various South African SOAs.
Structural equation modelling and hypothesis testing show that there are myriad of determinants influencing use and effective use of HRIS. The results further show that certain constructs are inconsistent with the existing literature. Nevertheless, this inconsistency speaks to the unique South African SOA contexts. The outcome of the study is a model which theoretically and practically explains those factors which must be considered to effectively use and utilise HRIS. That is, the theoretical, practical, methodological, and contextual contributions of the thesis is in explaining the determinants which are significant for effective use of HRIS. / Centre for Business Manangement / D.B.L.
|
109 |
Security of electronic personal health information in a public hospital in South AfricaChuma, Kabelo Given 01 1900 (has links)
The adoption of digital health technologies has dramatically changed the healthcare sector landscape and thus generates new opportunities to collect, capture, store, access and retrieve electronic personal health information (ePHI). With the introduction of digital health technologies and the digitisation of health data, an increasing number of hospitals and peripheral health facilities across the globe are transitioning from a paper-based environment to an electronic or paper-light environment. However, the growing use of digital health technologies within healthcare facilities has caused ePHI to be exposed to a variety of threats such as cyber security threats, human-related threats, technological threats and environmental threats. These threats have the potential to cause harm to hospital systems and severely compromise the integrity and confidentiality of ePHI. Because of the growing number of security threats, many hospitals, both private and public, are struggling to secure ePHI due to a lack of robust data security plans, systems and security control measures. The purpose of this study was to explore the security of electronic personal health information in a public hospital in South Africa. The study was underpinned by the interpretivism paradigm with qualitative data collected through semi-structured interviews with purposively selected IT technicians, network controllers’, administrative clerks and records management clerks, and triangulated with document and system analysis. Audio-recorded interviews were transcribed verbatim. Data was coded and analysed using ATLAS.ti, version 8 software, to generate themes and codes within the data, from which findings were derived. The key results revealed that the public hospital is witnessing a deluge of sophisticated cyber threats such as worm viruses, Trojan horses and shortcut viruses. This is compounded by technological threats such as power and system failure, network connection failure, obsolete computers and operating systems, and outdated hospital systems. However, defensive security measures such as data encryption, windows firewall, antivirus software and security audit log system exist in the public hospital for securing and protecting ePHI against threats and breaches. The study recommended the need to implement Intrusion Protection System (IPS), and constantly update the Windows firewall and antivirus program to protect hospital computers and networks against newly released viruses and other malicious codes. In addition to the use of password and username to control access to ePHI in the public hospital, the study recommends that the hospital should put in place authentication mechanisms such as biometric system and Radio Frequency Identification (RFID) system restrict access to ePHI, as well as to upgrade hospital computers and the Patient Administration and Billing (PAAB) System. In the absence of security policy, there is a need for the hospital to put in place a clear written security policy aimed at protecting ePHI. The study concluded that healthcare organisations should upgrade the security of their information systems to protect ePHI stored in databases against unauthorised access, malicious codes and other cyber-attacks. / Information Science / M. Inf. (Information Security)
|
110 |
Strategies for converting traditional academic library spaces to research commons : a South African perspectiveMatatiele, Refilwe Agnes 11 1900 (has links)
Background: Over the years, the traditional academic library has been the quintessential repository for hard-copy materials and relevant information resources to support the teaching, learning and research activities of their parent universities.
Accordingly, the reinvention of the academic library and its transition to the research commons model was induced by the combined effect of historical and momentous developments such as :globalisation; the worldwide democratisation of societies; the advent of mass higher education; as well as the irreversible proliferation of information
and communication technologies and their tectonic impact on the knowledge economy.
Purpose: This research study investigated strategies applied when converting traditional university libraries to the research commons service delivery model in South Africa. The study also sought participants’ perspectives in the identification of success
factors and constraints to such conversion strategies.
Methodology :The study adopted a combined qualitative-quantitative approach involving interviews, observations and questionnaires. Three public university libraries in Gauteng Province were involved as case studies to determine the extent of their orientation to the research commons model. In this regard, the study sample consisted
of a manager/librarian from each of the three university libraries. Data was collected primarily by means of a survey questionnaire and semi-structured individual interviews.
Explorative, descriptive and interpretive elements were applied to complement the data collection and analysis processes. Thematic data analysis was used for the ultimate categorisation and merging of both the questionnaire- and interview-based data accrued
rom the selected participants.
Results: Overall, the study found that careful planning and identification of positive conversion factors were critical aspects for successful implementation and evolution of any current or future research commons model. Critical factors included :formation of a
research library consortium; establishing one-stop multifunctional spaces; and ongoing user and space assessment to adjust services, resources and spaces accordingly to suit changing technologies, postgraduate needs and contemporary learning styles on
time and as required .Meanwhile, conversion hindrances included: model misconception by university leadership; strategic planning and change management deficiencies; poor communication; homogeneous staffing models and budgetary constraints. / Information Science / M.A. (Information Science)
|
Page generated in 0.1071 seconds